identify an evidence based delinquency prevention or intervention program involving law enforcement or corrections,

Assignment: Using DocSharing articles as a starting point:

1) identify an evidence based delinquency prevention or intervention program involving law enforcement or corrections,

2) explain with documentation how it was evaluated and the results of the evaluation. You must present data and its source(s).

3) If you work in a law enforcement or corrections agency, a) explain what policies are needed to implement the program in your agency, b) discuss the expected barriers to implementing the program, and c) discuss how you propose to overcome each barrier. NOTE: the program must fit within your agency; do not change the program or force it to fit (e.g., DARE cannot fit within the Veterans Administration police force as they do not work with youth), OR

4) If you do not work in a law enforcement of corrections agency, a) identify and explain the roles of at least three (3) key stakeholders you must convince to get the agency to adopt the program, b) thoroughly explain the steps you must take to convince each stakeholder and c) how, after you convince the stakeholders, you will implement the program.

5) Specifically explain in one paragraph how our university’s core value of RESPECT applies to specific contents of the textbook readings for this module and include a citation and page number

State what model you will use to investigate this issue.

Declining Trust in the Health Care System (The Trust Crisis)

Health reform is mired in the morass of multitiered payment systems and multiple modes of access, limited by the ability to seek and to pay. Increasingly, patients are interacting with multiple entities within the system, causing more and more confusion on the part of the patient. According to recent research, patients’ trust in the system, providers, and insurers continues to decline. This may result in a decline in individual health and an increase in costs for health care.
Investigate the declining trust in the health care system from an ethical and moral position. You may use the “four principles plus attention to scope model” of Beauchamp and Childress to address this, or any other ethical model that you choose.

State what model you will use to investigate this issue.
Identify 2 or more legal issues contributing to this problem.
Identify 2 or more economic and financial issues contributing to this problem.
Analyze the impact of various issues that are contributing to this problem, and rank them in order order from greatest to least impact.
Propose at least 1 modification that would increase trust in the health care system with rationale.

What information can you find on this site that will help you to estimate size of market for your marketing plan topic?

1 – Visit the U.S. Census website. What information can you find on this site that will help you to estimate size of market for your marketing plan topic?

2 – By using the Internet to also research articles written by trade journals and industry experts, what other relevant information can you find about your industry to help you estimate your market size and market potential?

Recommend and describe logical traps to stop attackers Justify your recommendations

Your company, Patrician LLC, develops wireless transmission technology. Upper management has decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster recovery site in a newly purchased building in Cheyenne, Wyoming.

Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development unit that is developing a secure microburst technology for use in the military market. This unit is made up of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to force their relocation to Tucson.

Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind.

Further specificationscompany requirements:

The two buildings will be considered identical (so you do not have to explain it twice – just reference that they are mirrors or however you wish to get the point across)
Cheyenne, WY site is a hot site for business continuitydisaster recovery
There needs to be a constant connection between the buildings with no less than 32 Mbps throughput
There will be a datacenter in each location on the third floor
There will be 100 network connections on each floor
There are 4 primary divisions in the company: HeadquartersAdministration, SalesCustomer support, Research and Development (this division includes the secure microburst group) and Information Technology
The members of the secure microburst research group that do not live in Tucson need to be able to connect to the primary datacenter at any time
Physical security as well as logical must be considered
There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability
All servers must have redundancy (both physical and how they are configured)
The solution should have a plan to verify security measures
Case requirements:

You should submit a network drawing listing the topology (or topologies if more than one is used) and it should include also list the hardware (only generally – no models, brands, etc. are necessary)
You should include a paper that contains the following:
List any recommended cable and where it will be used
Recommend wiring closets wherever needed
Recommend any WAN or wireless technologies
Recommend measures to take to protect against attack, to prevent attacks and to let you know when you are being attacked
Recommend and describe logical traps to stop attackers
Justify your recommendations

Choose one family systems theory (Bowenian, Structural, or Strategic) and one individual counseling theory studied in this course such as (CBT, REBT, or Person Centered) and compare the two theories

Directions: Choose one family systems theory (Bowenian, Structural, or Strategic) and one individual counseling theory studied in this course such as (CBT, REBT, or Person Centered) and compare the two theories. Complete the specific fields listed in the chart for each theory chosen. Provide a 25- to 50-word response for each field. Provide an in-text citation in each field as appropriate and include a full reference below.
Family Systems

Individual Counseling

Theory
Roles of the Counselor & Client
Strengths of the Approach
Limitations of the Approach
Appropriate Scenarios for Using the Approach
Appropriate Therapy Methods (Include 2 to 3)
Important Ethical Considerations

Provide a 4–6 page document in Word describing: the forensics procedures to collect, and process forensic evidence from these devices while following the fourth and fifth amendment guidelines.

A forensic unit within a federal crime lab has been tasked with the investigation of an individual who is suspected of the manufacturing, transportation, and sale of illegal fireworks explosives. Upon responding to a fire at the suspect’s house, firefighters discover 2.5 tons of explosives, and therefore, put out the fire from a distance. When investigators arrive on the scene, several networked computers, PDAs, cell phones, and laptops are found in an upstairs office. As junior investigators, they are unsure of how the fourth and fifth amendments will affect their investigation, search warrants, and the ultimate seizure of these devices. In addition, they are unsure of the standard operating procedures for processing computer evidence within the first and fourth amendments governance, so AB Investigative Services (ABIS) has been contracted to provide guidance in these areas.

Provide a 4–6 page document in Word describing:
the forensics procedures to collect, and process forensic evidence from these devices while following the fourth and fifth amendment guidelines

why digital forensics is an important role in our environment

Overview:In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

Identify theft
Hacking systems for data
Cyberstalking / harassment
Internet fraud
Non-access computer crimes
Cyberterrorism
InstructionsFor this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment

describe the specific role played by American troops in the Second Battle of the Marne, and in the months that followed between the battle and the German surrender in November 1918.

READ: After a bitter debate over how best to use American troops in World War I, it was determined that they would serve under General John J. Pershing, but accept the final strategic authority from the Allied Supreme Commander, Marshall Ferdinand Foch of France. Initially, American troops were used piecemeal to plug up holes and to drive Germans back, when possible. By 1918, American troops were fully engaged. They secured their first victory in May, at Cantigny, just north of Paris. They suffered terrible losses in June at Belleau Wood, but still claimed victory.

The real turning point came at the second Battle of the Marne, in July, where the combined efforts of the French, British, Italians, and Americans counteracted the German offensive and drove the Germans eastward. Notably, Americans soldiers, fresh to the war effort and not weighed down by years of fighting, provided a decisive edge. In the fall of 1918, Pershing lost over 100,000 men as he and the other Allied leaders continued to push the Germans back. By October 1918, Americans were behind German lines cutting supply lines, and in November 1918, Germany surrendered.

WRITE:a 850 word paper in which you describe the specific role played by American troops in the Second Battle of the Marne, and in the months that followed between the battle and the German surrender in November 1918.

INCLUDE: the following points in your paper:

Analysis of the role played by American troops in the Second Battle of the Marne, and subsequent engagements with the Germans
Discussion of weaponry used by soldiers in World War I, including but not limited to bayonets, flamethrowers, machine guns, pistols, mustard gas, rifles, tanks, and trench mortars
Discussion of the soldiers’ experiences, including but not limited to fighting in the trenches, the smell, boredom, lice, rats, food, common injuries, and battlefield engagement

Identify and describe the global market forces, risks, development chain, supply chain, and strategies from one of the following perspectives.

INSTRUCTIONS:

This week we reviewed global logistics, risk management, and the product and supply chains. Identify and describe the global market forces, risks, development chain, supply chain, and strategies from one of the following perspectives.

Supplier
Manufacturer (Pick this one)
Retailer
Customer
Decision Maker
750 – 1,000 words (3 – 4 pages) written essay
APA format required (including title page, reference page – no abstract required)
5 – 7 academic resources for 300/400 level courses
Content of paper should address the concepts covered this week utilizing personal experience as well as research

Which immigrants’ experiences reflected the message of the poem?

Complete a 5-7 page paper on the essay provided below. In addition, include a title page & works cited page. Also, include in-text documentation (parenthetical documentation).

Essay Topic:

In 1903 the following famous poem by Emma Lazarus was engraved and placed upon the Statue of Liberty in New York Harbor. Think about this poem’s message. Did immigrants’ experiences reflect the hope and promise of this poem?

The New Colossus

By Emma Lazarus

Not like the brazen giant of Greek fame,

With conquering limbs astride from land to land;

Here at our sea-washed, sunset gates shall stand

A mighty woman with a torch, whose flame

Is the imprisoned lightning, and her name

Mother of Exiles. From her beacon-hand

Glows world-wide welcome; her mild eyes command

The air-bridged harbor that twin cities frame.

“Keep ancient lands, your storied pomp!” cries she

With silent lips. “Give me your tired, your poor,

Your huddled masses yearning to breathe free,

The wretched refuse of your teeming shore.

Send these, the homeless, tempest-tossed to me,

I lift my lamp beside the golden door!”

In order to prepare and write this essay effectively, please address the following:

Do not rewrite the questions.

What is the message of this poem?
Click on this link to help you analyze the poem. After clicking on the link, click on the “Commentary” tab to learn about the meaning of the poem.

http://www.loc.gov/poetry/poetry-of-america/american-identity/aliciaostriker-emmalazarus.html

Which immigrants’ experiences reflected the message of the poem? Provide specific examples from the readings, films, assignments, and AVPs.
Which immigrants’ experiences did not reflect the message of the poem? Provide specific examples from the readings, films, assignments, and AVPs.